On cellular botnets: measuring the impact of malicious devices on a cellular network core

作者: Patrick Traynor , Michael Lin , Machigar Ongtang , Vikhyath Rao , Trent Jaeger

DOI: 10.1145/1653662.1653690

关键词:

摘要: … of the large scale compromise and coordination of mobile phones in attacks against the core of these networks. Through a combination of measurement, simulation and analysis, we …

参考文章(35)
Ari Juels, John G. Brainard, Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. network and distributed system security symposium. ,(1999)
William Aiello, Patrick D. McDaniel, Jacobus E. van der Merwe, Oliver Spatscheck, Subhabrata Sen, Charles R. Kalmanek, Enterprise Security: A Community of Interest Based Approach. network and distributed system security symposium. ,(2006)
Ju Wang, Xin Liu, Andrew A. Chien, Empirical study of tolerating denial-of-service attacks with a proxy network usenix security symposium. pp. 4- 4 ,(2005)
Thomas La Porta, Patrick McDaniel, Patrick Traynor, On attack causality in internet-connected cellular networks usenix security symposium. pp. 21- ,(2007)
Farnam Jahanian, Danny McPherson, Evan Cooke, The Zombie roundup: understanding, detecting, and disrupting botnets conference on steps to reducing unwanted traffic on internet. pp. 6- 6 ,(2005)
Steven Michael Bellovin, John Ioannidis, Implementing Pushback : Router-Based Defense Against DDoS Attacks network and distributed system security symposium. ,(2002) , 10.7916/D8R78MXV
David Dagon, Manos Antonakakis, Kevin Day, Xiapu Luo, Christopher P. Lee, Wenke Lee, Recursive DNS Architectures and Vulnerability Implications. network and distributed system security symposium. ,(2009)
Kameswari Kotapati, Peng Liu, Thomas F. LaPorta, CAT — A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks information security conference. pp. 158- 170 ,(2006) , 10.1007/0-387-33406-8_14
Angelos D. Keromytis, Daniel Stuart Rubenstein, Vishal Misra, Jason Nieh, Angelos Stavrou, MOVE: An End-to-End Solution To Network Denial of Service network and distributed system security symposium. pp. 81- 96 ,(2005) , 10.7916/D8ZW1W9V
Guofei Gu, Wenke Lee, Junjie Zhang, BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic network and distributed system security symposium. ,(2008)